X: 0 1 1 0 1 0
Y: 0 0 1 1 0 1
___________________________
~Y: ?
A. 0 1 1 1 1 1
B. 1 1 0 0 1 0
C. 0 0 1 0 0 0
D. 0 0 1 1 0 1
Answer: B
The ~ symbol represents the NOT function, which inverts the bits of the affected variable. In this case, the X value is not used.
A. Class
B. Instance
C. Message
D. Polymorphism
Answer: A
A class is a collection of the common methods from a set of objects that defines the behavior of those objects.
A. Theft
B. Destruction of assets
C. Waste of resources
D. Espionage
Answer: C
Although wasting resources is considered inappropriate activity, it is not actually a crime in most cases.
A. SMTP
B. POP3
C. PEM
D. IMAP
Answer: C
Privacy Enhanced Mail (PEM) is not a standard Internet email protocol; it is an add-on encryption mechanism that provides authentication, integrity, confidentiality, and nonrepudiation.
A. Transport
B. Encapsulating Security Paylod
C. Authentication Header
D. Tunnel
Answer: D
When IPSec is used in tunnel mode, entire packets, rather than just the payload, are encrypted. This mode is designed for use in gateway-to-gateway communications.
A. 192 bits
B. 256 bits
C. 512 bits
D. 1024 bits
Answer: B
The strongest keys supported by the Advanced Encryption Standard are 256 bits. The valid AES key lengths are 128, 192, and 256 bits.
A. Logic bomb
B. Virus
C. Trojan horse
D. Worm
Answer: C
Trojan horses masquerade as useful programs (such as a game) but really contain malicious code that runs in the background.
A. Sniffing
B. Denial of service
C. Brute-force attack
D. Buffer-overflow attack
Answer: B
Denial of service is the abundance of unsolicited messages arriving to the extent it prevents legitimate activity.
A. 802.15
B. 802.11
C. 802.16
D. 802.3
Answer: A
802.15 (aka Bluetooth) creates personal area networks (PANs).
A. Ring
B. Star
C. Bus
D. Mesh
Answer: D
Mesh topologies provide redundant connections to systems, allowing multiple segment failures without seriously affecting connectivity.
A. Reliable log storage system
B. Proper warning banner notification
C. Legal defense/support of authentication
D. Use of discretionary access control
Answer: C
To effectively hold users accountable, your security must be legally defensible. Primarily, you must be able to prove in a court that your authentication process cannot be easily compromised. Thus, your audit trails of actions can then be tied to a human.
A Switch
B. Repeater
C. Bridge
D. Brouter
Answer: D
A brouter is a device that attempts to route first, but if that fails, it defaults to bridging.
A. An open system does not allow anyone to view its programming code.
B. A closed system does not define whether or not its programming code can be viewed.
C. An open source program can only be distributed for free.
D. A closed source program cannot be reverse engineered or decompiled.
Answer: B
A closed system is designed to work well with a narrow range of other systems, generally all from the same manufacturer. The standards for closed systems are often proprietary and not normally disclosed. However, a closed system (as a concept) does not define whether or not its programming code can be viewed. An open system (as a concept) also does not define whether or not its programming code can be viewed. An open source program can be distributed for free or for a fee. A closed source program can be reverse engineered or decompiled.
A. Logical control
B. Technical control
C. Access control
D. Administrative control
Answer: C
Access control is any hardware, software, or organizational administrative policy or procedure that grants or restricts access, monitors and records attempts to access, identifies users attempting to access, and determines whether access is authorized.
A. To secure everything at a high security level because securing everything at a low security level means sensitive data is easily accessible
B. To determine how much effort, money, and resources are allocated to protect the data and control access to it
C. To secure everything at a low security level because securing everything at a high security level is too expensive and restricts access to unclassified, noncritical data
D. To provide for nonrepudiation
Answer: D
Providing for nonrepudiation is not a reason for data classification.
A. Mandatory access control model
B. Discretionary access control model
C. Role-based access control model
D. Rule-based access control model
Answer: B
A discretionary access control model allows the owner (or data custodian) of a resource to grant permissions at the discretion of the owner. The other answers are non-discretionary models.
A. Semantic integrity mechanism
B. Concurrency
C. Polyinstantiation
D. Database partitioning
Answer: B
Concurrency uses a “lock” feature to allow an authorized user to make changes and then “unlock” the data elements only after the changes are complete. This is done so another user is unable able to access the database to view and/or make changes to the same elements at the same time.
A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation
Answer: C
The challenge-response protocol is an authentication protocol that uses cryptographic techniques to allow parties to assure each other of their identity.
A. Workstation change
B. Separation of duties
C. Discretionary access control
D. Job responsibility restrictions
Answer: A
Workstation change is an effective means of preventing and detecting the presence of unapproved software.
A. 0 to 1,023
B. 80, 135, 110, 25
C. 0 to 65, 536
D. 32,000 to 65,536
Answer: A
Ports 0 to 1,023 are the well-known ports.
A. Inbound traffic with a private IP address
B. Outbound traffic with a private IP address
C. Inbound traffic with an address in the range 10.8.6.0/24
D. Outbound traffic with an address outside the range 10.8.6.0/24
Answer: D
Although it is true that John would probably want to filter out all of these types of traffic for various reasons, he would be specifically interested in filtering out outbound traffic with an address not belonging to his network to achieve his stated goal.
A. Data remanence
B. Record retention
C. Data diddling
D. Data mining
Answer: B
Record retention policies define the amount of time to keep any data, including logs. Data remanence is data remnants on media. Data diddling refers to the modification of data before or during data entry resulting in incorrect or corrupt data. Data mining refers to extracting meaningful knowledge from large amounts of data.
A. Bridges and switches
B. Firewalls
C. Hubs and repeaters
D. Routers
Answer: C
Network hardware devices that function at layer 1, the Physical layer, are hubs and repeaters.
A. Nondiscretionary access control
B. Mandatory access control
C. Discretionary access control
D. Logical access control
Answer: B
Mandatory access control enforces an access policy that is determined by the system, not the object owner.